当前位置: 首页 > news >正文

泰安网站建设开发公司北京网站搭建开发

泰安网站建设开发公司,北京网站搭建开发,自己的商品链接怎么弄,搜索引擎大全网站只有一个问题#xff0c;原来的httpGet存活、就绪检测一直不通过#xff0c;于是改为tcpSocket后pod正常。 wget https://github.com/kubernetes-sigs/metrics-server/releases/latest/download/components.yaml修改后的yaml文件#xff0c;镜像修改为阿里云 apiVersion: …只有一个问题原来的httpGet存活、就绪检测一直不通过于是改为tcpSocket后pod正常。 wget https://github.com/kubernetes-sigs/metrics-server/releases/latest/download/components.yaml修改后的yaml文件镜像修改为阿里云 apiVersion: v1 kind: ServiceAccount metadata:labels:k8s-app: metrics-servername: metrics-servernamespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata:labels:k8s-app: metrics-serverrbac.authorization.k8s.io/aggregate-to-admin: truerbac.authorization.k8s.io/aggregate-to-edit: truerbac.authorization.k8s.io/aggregate-to-view: truename: system:aggregated-metrics-reader rules: - apiGroups:- metrics.k8s.ioresources:- pods- nodesverbs:- get- list- watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata:labels:k8s-app: metrics-servername: system:metrics-server rules: - apiGroups:- resources:- nodes/metricsverbs:- get - apiGroups:- resources:- pods- nodesverbs:- get- list- watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata:labels:k8s-app: metrics-servername: metrics-server-auth-readernamespace: kube-system roleRef:apiGroup: rbac.authorization.k8s.iokind: Rolename: extension-apiserver-authentication-reader subjects: - kind: ServiceAccountname: metrics-servernamespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata:labels:k8s-app: metrics-servername: metrics-server:system:auth-delegator roleRef:apiGroup: rbac.authorization.k8s.iokind: ClusterRolename: system:auth-delegator subjects: - kind: ServiceAccountname: metrics-servernamespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata:labels:k8s-app: metrics-servername: system:metrics-server roleRef:apiGroup: rbac.authorization.k8s.iokind: ClusterRolename: system:metrics-server subjects: - kind: ServiceAccountname: metrics-servernamespace: kube-system --- apiVersion: v1 kind: Service metadata:labels:k8s-app: metrics-servername: metrics-servernamespace: kube-system spec:ports:- name: httpsport: 443protocol: TCPtargetPort: httpsselector:k8s-app: metrics-server --- apiVersion: apps/v1 kind: Deployment metadata:labels:k8s-app: metrics-servername: metrics-servernamespace: kube-system spec:selector:matchLabels:k8s-app: metrics-serverstrategy:rollingUpdate:maxUnavailable: 0template:metadata:labels:k8s-app: metrics-serverspec:containers:- args: # - --cert-dir/tmp # - --secure-port4443 # - --kubelet-preferred-address-typesInternalIP,ExternalIP,Hostname # - --kubelet-use-node-status-port # - --metric-resolution15s- --cert-dir/tmp- --secure-port4443- --metric-resolution30s- --kubelet-insecure-tls- --kubelet-preferred-address-typesInternalIP,ExternalIP,Hostname- --requestheader-username-headersX-Remote-User- --requestheader-group-headersX-Remote-Group- --requestheader-extra-headers-prefixX-Remote-Extra-image: registry.aliyuncs.com/google_containers/metrics-server:v0.6.4imagePullPolicy: IfNotPresentlivenessProbe:failureThreshold: 3tcpSocket:port: 4443periodSeconds: 10name: metrics-serverports:- containerPort: 4443name: httpsprotocol: TCPreadinessProbe:failureThreshold: 3tcpSocket:port: 4443initialDelaySeconds: 20periodSeconds: 10resources:requests:cpu: 100mmemory: 200MisecurityContext:allowPrivilegeEscalation: falsereadOnlyRootFilesystem: truerunAsNonRoot: truerunAsUser: 1000volumeMounts:- mountPath: /tmpname: tmp-dirnodeSelector:kubernetes.io/os: linuxpriorityClassName: system-cluster-criticalserviceAccountName: metrics-servervolumes:- emptyDir: {}name: tmp-dir --- apiVersion: apiregistration.k8s.io/v1 kind: APIService metadata:labels:k8s-app: metrics-servername: v1beta1.metrics.k8s.io spec:group: metrics.k8s.iogroupPriorityMinimum: 100insecureSkipTLSVerify: trueservice:name: metrics-servernamespace: kube-systemversion: v1beta1versionPriority: 100kubectl apply -f components.yaml部署kube-prometheus 兼容1.27的为main分支 只克隆main分支 git clone --single-branch --branch main https://github.com/prometheus-operator/kube-prometheus.git cd kube-prometheus如果直接运行kubectl apply -f manifests/setup/会有元数据注解太长的错误 Error from server (Invalid): error when creating manifests/setup/0prometheusCustomResourceDefinition.yaml: CustomResourceDefinition.apiextensions.k8s.io prometheuses.monitoring.coreos.com is invalid: metadata.annotations: Too long: must have at most 262144 bytes应该使用以下方式 1. kubectl apply -f manifests/setup/ 2. kubectl apply --server-side -f manifests/setup CRD正常创建后然后再执行: kubectl apply -f manifests镜像下载使用这个项目的方法https://github.com/DaoCloud/public-image-mirror,在镜像前面加m.daocloud.io prometheus-k8s-0 pod报权限不足问题 ts2023-08-21T03:14:34.582Z callerklog.go:116 levelerror componentk8s_client_runtime funcErrorDepth msgpkg/mod/k8s.io/client-gov0.27.3/tools/cache/reflector.go:231: Failed to watch *v1.Pod: failed to list *v1.Pod: pods is forbidden: User \system:serviceaccount:monitoring:prometheus-k8s\ cannot list resource \pods\ in API group \\ at the cluster scope处理 修改prometheus-clusterRole.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata:labels:app.kubernetes.io/component: prometheusapp.kubernetes.io/name: prometheusapp.kubernetes.io/part-of: kube-prometheusapp.kubernetes.io/version: 2.26.0name: prometheus-k8s rules: - apiGroups:- resources:- nodes/metrics- services- endpoints- podsverbs:- get- list- watch - nonResourceURLs:- /metricsverbs:- get跨节点pind不通monitoring下的pod ipprometheus target异常问题处理 删除kube-prometheus/manifests下的netowrkprolic alertmanager-networkPolicy.yaml blackboxExporter-networkPolicy.yaml grafana-networkPolicy.yaml kubeStateMetrics-networkPolicy.yaml nodeExporter-networkPolicy.yaml prometheusAdapter-networkPolicy.yaml prometheus-networkPolicy.yaml prometheusOperator-networkPolicy.yaml使用ServiceMonitor添加监控 以ingress-nginx为例 修改ingress-nginx.yaml的service apiVersion: v1 kind: Service metadata:annotations:prometheus.io/port: 10254 #新增内容prometheus.io/scrape: true #新增内容labels:app.kubernetes.io/component: controllerapp.kubernetes.io/instance: ingress-nginxapp.kubernetes.io/name: ingress-nginxapp.kubernetes.io/part-of: ingress-nginxapp.kubernetes.io/version: 1.8.1name: ingress-nginx-controllernamespace: ingress-nginx spec:externalTrafficPolicy: LocalipFamilies:- IPv4ipFamilyPolicy: SingleStackports:- appProtocol: httpname: httpport: 80protocol: TCPtargetPort: http- appProtocol: httpsname: httpsport: 443protocol: TCPtargetPort: https- appProtocol: http #新增内容name: prometheus #新增内容port: 10254 #新增内容protocol: TCP #新增内容targetPort: 10254 #新增内容selector:app.kubernetes.io/component: controllerapp.kubernetes.io/instance: ingress-nginxapp.kubernetes.io/name: ingress-nginxtype: LoadBalancer# ingress-nginx-monitor.yamlapiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata:name: ingress-nginx # ServiceMonitor名称namespace: monitoring # ServiceMonitor所在名称空间 spec:endpoints: # prometheus所采集Metrics地址配置endpoints为一个数组可以创建多个但是每个endpoints包含三个字段interval、path、port- interval: 15s # prometheus采集数据的周期单位为秒path: /metrics # prometheus采集数据的路径port: prometheus # prometheus采集数据的端口这里为port的name主要是通过spec.selector中选择对应的svc在选中的svc中匹配该端口namespaceSelector: # 需要发现svc的范围any: true # 有且仅有一个值true当该字段被设置时表示监听所有符合selector所选择的svcselector:matchLabels: # 选择svc的标签app.kubernetes.io/component: controllerapp.kubernetes.io/instance: ingress-nginxapp.kubernetes.io/name: ingress-nginxapp.kubernetes.io/part-of: ingress-nginxapp.kubernetes.io/version: 1.8.1kubectl apply -f ingress-nginx-monitor.yaml 确认ingress-nginx servicemonitors已添加 kubectl -n monitoring get servicemonitors.monitoring.coreos.com NAME AGE alertmanager-main 70m blackbox-exporter 70m coredns 70m grafana 70m ingress-nginx 24m kube-apiserver 70m kube-controller-manager 70m kube-scheduler 70m kube-state-metrics 70m kubelet 70m node-exporter 70m prometheus-adapter 70m prometheus-k8s 70m prometheus-operator 70m 监控外部ETCD etcd配置文件添加ETCD_LISTEN_METRICS_URLS“http://0.0.0.0:2381” etcd-job.yaml - job_name: etcd-serverscrape_interval: 30sscrape_timeout: 10sstatic_configs:- targets: [172.16.0.157:2381]labels:instance: etcdserver创建secret kubectl create secret generic etcd-secret --from-fileetcd-job.yaml -n monitoringkube-prometheus/manifests/prometheus-prometheus.yaml 末尾添加配置 apiVersion: monitoring.coreos.com/v1 kind: Prometheus metadata:labels:app.kubernetes.io/component: prometheusapp.kubernetes.io/instance: k8sapp.kubernetes.io/name: prometheusapp.kubernetes.io/part-of: kube-prometheusapp.kubernetes.io/version: 2.46.0name: k8snamespace: monitoring spec:alerting:alertmanagers:- apiVersion: v2name: alertmanager-mainnamespace: monitoringport: webenableFeatures: []externalLabels: {}image: quay.io/prometheus/prometheus:v2.46.0nodeSelector:kubernetes.io/os: linuxpodMetadata:labels:app.kubernetes.io/component: prometheusapp.kubernetes.io/instance: k8sapp.kubernetes.io/name: prometheusapp.kubernetes.io/part-of: kube-prometheusapp.kubernetes.io/version: 2.46.0podMonitorNamespaceSelector: {}podMonitorSelector: {}probeNamespaceSelector: {}probeSelector: {}replicas: 2resources:requests:memory: 400MiruleNamespaceSelector: {}ruleSelector: {}securityContext:fsGroup: 2000runAsNonRoot: truerunAsUser: 1000serviceAccountName: prometheus-k8sserviceMonitorNamespaceSelector: {}serviceMonitorSelector: {}version: 2.46.0additionalScrapeConfigs: #新增name: etcd-secret #新增key: etcd-job.yaml #新增kubectl apply -f kube-prometheus/manifests/prometheus-prometheus.yamlgrafana导入 3070模板 http存活检测 kind: Probe apiVersion: monitoring.coreos.com/v1 metadata:name: example-com-websitenamespace: monitoring spec:interval: 60smodule: http_2xxprober:url: blackbox-exporter.monitoring.svc.cluster.local:19115targets:staticConfig:static:- https://www.baidu.com添加proxy监控默认为http --- apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata:labels:app.kubernetes.io/name: kube-proxyapp.kubernetes.io/part-of: kube-prometheusname: kube-proxynamespace: monitoring spec:endpoints:- bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/tokeninterval: 30sport: http-metricsscheme: httptlsConfig:insecureSkipVerify: truejobLabel: app.kubernetes.io/namenamespaceSelector:matchNames:- kube-systemselector:matchLabels:app.kubernetes.io/name: kube-proxy --- apiVersion: v1 kind: Endpoints metadata:name: kube-proxynamespace: kube-systemlabels:app.kubernetes.io/name: kube-proxy subsets: - addresses:- ip: 172.16.0.157targetRef:kind: Nodename: master1- ip: 172.16.0.124targetRef:kind: Nodename: node1- ip: 172.16.0.46targetRef:kind: Nodename: node2ports:- name: http-metricsport: 10249protocol: TCP --- apiVersion: v1 kind: Service metadata:name: kube-proxynamespace: kube-systemlabels:app.kubernetes.io/name: kube-proxy spec:type: ClusterIP clusterIP: Noneports:- name: http-metricsport: 10249targetPort: 10249protocol: TCP
http://www.hkea.cn/news/14360046/

相关文章:

  • 平潭做网站企业网站建设的收获
  • 带dede后台的整套网站源码 怎么进入dede后台贸易公司 网站 扶持
  • 什么叫网站的域名专业做网站建设公司有哪些
  • 2018春节放假安排 网站建设网站建设费计什么科目
  • 免费建设淘宝客网站平面设计师需要会什么软件
  • 专业网站是什么意思工地建筑模板尺寸
  • 深网著名网站easyui 网站设计
  • 网站建设佰首选金手指十六青岛网站开发哪家好
  • 软件网站开发设计一年网站维护
  • 企业网站建设文案公众号开发主要做什么
  • 做设计必看十大网站电子商务平台经营者接到通知后
  • dedecms做的网站_网站中的图片总是被同一ip恶意点击360网站建设公司哪家好
  • 如何建设成为营销网站连云港企业网站建设公司
  • 深圳网站托管公司高端+旅游+网站建设
  • ftp是属于一种网站发布方式做网站营业执照经营范围怎么填写
  • 深圳优秀网站建设网站建设需求方案pdf
  • 珠海网站建设的公司哪家好外贸企业网站源码
  • 广州企业网站推广新注册域名做网站好处
  • 网站服务器容器西安网站建设网站
  • 西安的推广公司上海搜索引擎关键词优化
  • 企业怎么做好网站优化那个网站有用director做的片头
  • 网站运营seo百度网盘搜索入口
  • 爱做网站wordpress爆路径
  • 专业建站商wordpress切换语言实现
  • 华为官方网站服务商
  • 订餐网站开发流程集安网站制作
  • 手机网站制作推广定制wordpress 导航特效
  • 营销网站建设流程图搭建的网站403
  • 网站建设比较合理的流程是windows搭建wordpress
  • 申请网站网站成都高新区国土规划建设局网站